Search results for "Security"
showing 10 items of 1693 documents
Before newspapers and the telegraph: information distribution in Livland more than two hundred years ago
2020
This paper concerns information dissemination in the Livland province of the Russian Empire at the turn of the eighteenth and the nineteenth centuries, when its rulers sent their orders to the provincial capital, Riga, by horse post. In Riga they were translated into German, and the ancient network of information dissemination used by the Lutheran Church was engaged. The orders of both the Empire and provincial rulers were delivered to Lutheran pastors, who announced this information to their parishes from the pulpit, speaking in Latvian or Estonian so as to be understood by local peasants (serfs), and allowed the texts to circulate around the manors of the parish. The infrastructure of th…
“Another Munich We Just Cannot Afford”: Historical Metonymy In Politics
2016
The appeasement of Hitler and the Munich Agreement is a rhetorical comparison used commonly in international relations to defend politico-military action. On the basis of conceptual history and rhetorics, we examine cases of political speech in this paradigm. Firstly, we discuss time and conceptualize experience into first and second order experiences. Secondly, the roles of metaphor, metonymy and analogy in relation to thought and action are examined. We then contextualise Munich 1938, and present three cases demonstrating the political usage of this metonymy since WWII. These range from the Suez Crises to the Gulf War and on-going War on Terror. These cases show that “Munich” can be used …
Terminological Games: The Finnish Security Police Monitoring the Far-Right Movements in Finland During the Cold War
2020
This article focuses on the use of terms and concepts related to the nationalist movements by the Finnish security police during the Cold War. The key objective of the security police was to protect the legal order of the state and monitor the groups and phenomena potentially harmful to that cause. The previous experience regarding the rise of the radical nationalism and fascism in Finland in the 1930s and the 1947 Paris peace treaties were the historical and legal contexts within which the interpretations were made. As the article shows, interpretation made by the security police, however, relied occasionally on a limited understanding about the evolving far-right scene, thus producing ter…
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks
2009
In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption based scheme is not compromise resilient. To achieve all the desires, we propose a scheme - H2S by making use of both homomorphic secret sharing and homomorphic encryption. The security and efficiency of our scheme are justified by extensive analysis.
Home as a Base for a Well-Lived Life: Comparing the Capabilities of Homeless Service Users in Housing First and the Staircase of Transition in Europe
2020
Nussbaum’s Central Capabilities refer to the elements of a well-lived life, and many adults who experience homelessness are deprived of these capabilities. The study aim was to investigate whether service users experience different homeless services as affording or constraining capabilities. We conducted semi-structured interviews with homeless service users (n = 77) in Housing First (HF) and staircase services (SS) in eight European countries. We used thematic analysis to identify three themes: autonomy and dependency, the relational impact of living arrangements, and community interaction and stigma. While SS participants were able to address their bodily integrity and health, their highe…
The European Courts and the Security Council: Between Dédoublement Fonctionnel and Balancing of Values: a Rejoinder to Grainne de Burca, André Nollka…
2009
* Professor of International Law, University of Naples ‘ Federico II ’ . Email: padesena@tin.it ; Associate Professor of International Law, University of Palermo. Email: chiara.vitucci@unipa.it 1 Nollkaemper, ‘ The European Courts and the Security Council: Between Dedoublement Fonctionnel and Balancing of Values: A Reply to De Sena and Vitucci ’ , 20 EJIL (2009) 862. Andre Nollkaemper, Grainne de Burca and Iris Canor have made a number of critical observations which are – in part at least – interesting and useful. A full examination of them would probably demand more time and more space than we have been given here. Nevertheless, we will try to reply to some of their remarks and to clear up…
A case study to the Evaluation of Global Environmental Quality, concerning thermal, acoustic and atmospheric conditions of urban areas
2013
In this paper we propose an operative procedure aimed at assessing and check the global environmental quality in the urban areas. This methodology is set up by using an ergonomic approach that analyses the interaction man-environment in terms of cause-effect and uses information and data from various sources contributing to the formation of discomfort degrees.[1-2] The representation technique by normo-grams is used for showing some applications executed along the urban territory of Palermo and allows to evaluate very simply all the parameters involved in human comfort. This paper is divided in 5 sections, after the introduction in section 2 a review of the principal simple and complex inde…
Mobilità, sicurezza e nuove frontiere tecnologiche
2018
Mobilità, sicurezza e nuove frontiere tecnologiche sono settori che hanno ormai assunto un ruolo trainante nell’evoluzione/trasformazione del diritto penale e processuale penale dei paesi occidentali, e segnatamente di quelli europei. Su di essi si è incentrato un Modulo Jean Monnet svolto, tra il 2015 e il 2018, presso il Dipartimento di Giurisprudenza dell’Università di Palermo, che ha visto alternarsi, in qualità di relatori, tanto esperti di caratura internazionale quanto giovani studiosi e dottorandi. Questo libro contiene alcuni dei loro contributi: una raccolta che, se certo non esaurisce la trattazione della varietà e complessità di profili che ciascuno dei tre ambiti problematici p…
Security in the Wireless Application Protocol : post-graduate thesis in information and communication technology
2000
Masteroppgave i informasjons- og kommunikasjonsteknologi 2000 - Høgskolen i Agder, Grimstad The necessity of being online wherever you are and at any time, have brought foreword the WAP technology. Solution based on banking, industry, and sale among others, is services and application that are on the market to day. Like in all new technologies the security issues in WAP is of great interest. The interest lies on both possible intruders and company that want to make a profit out of it by offering services. This assignment enlightens possible security problems in the WAP architecture, both in the security layer Wireless Transport Layer of Security (WTLS) and the WAP infrastructure. The report…
IS Security Policy Violations
2012
Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory RCT-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insig…